US7796012B2 - Method of controlling access to an area accessible by persons, particularly to a space closed by a door - Google Patents

Method of controlling access to an area accessible by persons, particularly to a space closed by a door Download PDF

Info

Publication number
US7796012B2
US7796012B2 US11/459,992 US45999206A US7796012B2 US 7796012 B2 US7796012 B2 US 7796012B2 US 45999206 A US45999206 A US 45999206A US 7796012 B2 US7796012 B2 US 7796012B2
Authority
US
United States
Prior art keywords
access code
communications unit
mobile communications
unit
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US11/459,992
Other versions
US20070024417A1 (en
Inventor
Bernhard Gerstenkorn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventio AG
Original Assignee
Inventio AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventio AG filed Critical Inventio AG
Assigned to INVENTIO AG reassignment INVENTIO AG ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GERSTENKORN, BERNHARD
Publication of US20070024417A1 publication Critical patent/US20070024417A1/en
Application granted granted Critical
Publication of US7796012B2 publication Critical patent/US7796012B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points

Definitions

  • the present invention relates to a method of controlling access to an area accessible by persons, particularly to a space closed by a door.
  • a first mobile communications unit on which at least one access code is filed and a receiver unit for receiving the access code are provided.
  • the receiver unit serves for checking the access code and frees access after a successful checking of the access code.
  • Modern access control systems of buildings are frequently operated by a chipcard on which an electronic key is filed.
  • user-specific data such as, for example, a personal visit card or the like can also be stored on a chipcard of that kind.
  • the data on the chipcard can be provided with an expiry date so that use of the chipcard is possible only for a specific period of time.
  • the disadvantage exists with a chipcard of that kind, particularly when this forms the sole control authority of the door lock, that the chipcard can be passed on to an unauthorized third party or lost.
  • US published patent application 2002/0180582 A1 describes a method of controlling access to an environment locked by a lock, wherein a first access code is stored in a first memory unit and a second access code is stored in a second memory unit of an electronic key unit.
  • the electronic key unit which is preferably formed by a mobile telephone, communicates the second access code to a control unit of the lock.
  • the communicated second access code is subsequently compared with the first access code stored in the first memory unit and, if the first access code agrees with the second access code, the lock is released.
  • the mobile telephone is in that case equipped in such a manner that the second memory unit can store a plurality of access codes for a number of buildings. In this way the user can make a selective choice of an access code and communicate this to the control unit of the lock equipment.
  • the access code stored on the mobile telephone is usable only by a user who is in possession of the mobile telephone and knows the PIN code for switching the mobile telephone to be free. This is usually in that case one and the same person. For this reason the access right in the form of the access code is transmissible to a third party only in the case of handing over the mobile telephone and making known the PIN code to the third party.
  • the present invention has the object of so developing a method of controlling access to an area accessible by persons that an access right in the form of an access code can be granted to further authorized persons whilst ensuring security.
  • the method comprises the following steps:
  • the method according to the present invention is based on the recognition that through the use of several mobile communications units which are equipped to communicate at least one access code amongst one another and to the receiver unit there is created an access control system in which the transfer of an access right by means of the communications unit carried by the user can take place in simple, but nevertheless secure manner.
  • the method according to the present invention makes it possible for the access code stored on the various communications units to be communicated, for example, by a central computer unit to selected communications units and thus to also be able to be changed or locked during the provided use time period.
  • a method is provided by the present invention which is preferably used for access control of elevators and buildings, offices, dwellings and individual rooms in units of that kind.
  • a wireless communication between the units is preferably used for communication of the data in the form of code sequences which can comprise, apart from the access codes, further data.
  • a near-field communications system is preferably provided as communications network. This means that the communication between the respective units is possible only within a near field. In this manner it can be ensured that no unauthorized access to the communications network takes place and that there is no possible spying on access codes.
  • the term “unit” in the case of the present invention forms a generic expression for the communications units and the receiver unit.
  • the access code is transmitted and received only when the mutually communicating units are spaced from one another at a predetermined distance.
  • this spacing is less than approximately ten meters, preferably less than approximately one meter.
  • the access code can be transmitted from the first communications unit to the second communications unit only when the two communications units are held near one another, for example at a distance of a few centimeters.
  • Conventional interfaces, particularly infrared interfaces, can be used for a wireless, radio-based data transmission of that kind and, in particular, the NFC standard can be used as transmission standard.
  • the access code is provided with at least one attribute and/or at least one attribute of the access code is changed.
  • the attribute is created or changed by the first communications unit or by the second communications unit.
  • a specific running time or a copying protection can be assigned as the attribute.
  • an attribute can also be provided according to which a restricted number of copies of the electronic key can be created or the electronic key can only be cancelled.
  • the access can be freed only within a predetermined period of time.
  • access for a first group of persons can be allowed only during the day and for a second group of persons only at night.
  • the receiver unit and/or the mobile communications unit can be appropriately equipped and/or the access code itself can be appropriately generated.
  • the access code is cancelled after a predetermined number of uses for freeing the access.
  • the cancellation can take place after a single use or multiple uses and either automatically or by an authorized person operating a central computer unit.
  • a computer unit For filing the access code on the first communications unit a computer unit generates the access code and communicates this to the first communications unit. In that case the communication by the computer unit to the first communications unit can take place by means of a global, local or near-field communications network. Alternatively, a wire-bound line for data transmission can also be used.
  • a mobile telephone is used as the first communications unit and/or the second communications unit.
  • a mobile telephone is used as the first communications unit and/or the second communications unit.
  • the access code is processed by means of the first communications unit and/or by means of the second communications unit.
  • an access code of a door lock can be blocked by the mobile communications unit without the receiver unit or a central computer unit having to be operated for this purpose.
  • FIG. 1 is a schematic illustration of an access control system according to the present invention.
  • FIG. 1 schematically shows an access control system for a space closed by a door 1 , for example for an elevator.
  • the door 1 is equipped with an electronic door lock 2 and a receiver unit 10 .
  • the access control system additionally comprises a first mobile communications unit 20 and a second mobile communications unit 30 .
  • This access code could now be communicated directly from the first communications unit 20 to the receiver unit 10 of the door lock 2 .
  • the access code is, for transfer of the access right to another person, transmitted to the second communications unit 30 .
  • the user of the first communications unit 20 can selectively process the access code. For this purpose the user selects the desired function, for example “Copy”, in a menu by way of a display 23 and a keyboard 24 of the first communications unit 20 and subsequently transmits the copy of the access code to the second communications unit 30 by selection of the function “Transfer”.
  • the first communications unit 20 has for transfer of the access code an interface 22 and the second communications unit 30 has an interface 32 for wireless, radio-based data transmission.
  • the data transfer takes place only when the first communications unit 20 is disposed in a near field of the second communications unit 30 or conversely.
  • the distance between the interfaces 22 , 32 amounts to only a few centimeters.
  • the NFC standard is used as transmission standard.
  • the communicated access code is stored in a memory unit 31 of the second communications unit 30 .
  • the access code can be provided with an attribute or an attribute already assigned by the computer unit 40 can be changed.
  • a specific running time or a copying protection is preferably assigned as attribute. It can equally be provided that the second communications unit 30 is authorized to be able to similarly undertake specific changes to the access code.
  • the second communications unit 30 is held with its interface 32 near an interface 12 of the receiver unit 10 so that a wire-free communication of the access code by means of a near-field network and the NEC standard is possible.
  • the second communications unit 30 has a display 33 and a keyboard 34 for operating the second communications unit 30 by way of a menu guide.
  • the second communications unit 30 and/or the receiver unit 10 can be so equipped that release of the door lock 2 takes place only as long as the second communications unit 30 is located within a specific distance from the receiver unit 10 , for example within a near field.
  • the access code can also be programmed so that the door lock 2 is released only within a predetermined period of time or at a specific point in time.
  • the release of the door lock 2 can also be activated only when not only the first communications unit 20 , but also the second communications unit 30 are disposed within a predetermined distance from the receiver unit 10 .
  • every communication of the access code by one of the units 20 , 30 can be secured by an advance PIN code interrogation.
  • the access code for the door lock 2 can be locked by the first communications unit 20 without the central computer unit 40 having to be operated for this purpose.
  • the authorized party holds the first communications unit 20 at the receiver unit 10 and selects in the menu the option “Lock” for locking the access code.
  • the described method for access control to a space closed by the door 1 is distinguished particularly by the fact that the electronic key is transferable in the form of an access code from the first communications unit 20 to the second communications unit 30 in simple manner by wireless data transmission, wherein security is guaranteed in that the communications units 20 , 30 are usable only after a PIN code interrogation and the data transmission is possible only in a near field.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Maintenance And Inspection Apparatuses For Elevators (AREA)
  • Alarm Systems (AREA)
  • Telephone Function (AREA)

Abstract

A method of controlling access to an area accessible by persons, particularly to a space closed by a door, includes providing a first mobile communications unit on which at least one access code is filed, at least one second mobile communications unit and a receiver unit for receiving the access code. The access code is transmitted by the first communications unit to the second communications unit. The access code is transmitted to the receiver unit by this second communications unit. After a successful checking of the access code by the receiver unit the door access is freed.

Description

BACKGROUND OF THE INVENTION
The present invention relates to a method of controlling access to an area accessible by persons, particularly to a space closed by a door. For performance of the method a first mobile communications unit on which at least one access code is filed and a receiver unit for receiving the access code are provided. The receiver unit serves for checking the access code and frees access after a successful checking of the access code.
Modern access control systems of buildings are frequently operated by a chipcard on which an electronic key is filed. Apart from this electronic key, user-specific data such as, for example, a personal visit card or the like can also be stored on a chipcard of that kind. In addition, the data on the chipcard can be provided with an expiry date so that use of the chipcard is possible only for a specific period of time. However, the disadvantage exists with a chipcard of that kind, particularly when this forms the sole control authority of the door lock, that the chipcard can be passed on to an unauthorized third party or lost.
Some solutions for this problem are already known from the state of the art. Thus, US published patent application 2002/0180582 A1, for example, describes a method of controlling access to an environment locked by a lock, wherein a first access code is stored in a first memory unit and a second access code is stored in a second memory unit of an electronic key unit. The electronic key unit, which is preferably formed by a mobile telephone, communicates the second access code to a control unit of the lock. The communicated second access code is subsequently compared with the first access code stored in the first memory unit and, if the first access code agrees with the second access code, the lock is released. The mobile telephone is in that case equipped in such a manner that the second memory unit can store a plurality of access codes for a number of buildings. In this way the user can make a selective choice of an access code and communicate this to the control unit of the lock equipment.
It has proved disadvantageous with this known method that the access code stored on the mobile telephone is usable only by a user who is in possession of the mobile telephone and knows the PIN code for switching the mobile telephone to be free. This is usually in that case one and the same person. For this reason the access right in the form of the access code is transmissible to a third party only in the case of handing over the mobile telephone and making known the PIN code to the third party.
SUMMARY OF THE INVENTION
The present invention has the object of so developing a method of controlling access to an area accessible by persons that an access right in the form of an access code can be granted to further authorized persons whilst ensuring security.
According to the present invention for fulfillment of this object in the case of a method of controlling access to an area accessible by persons, particularly to a space closed by a door, with a first mobile communications unit on which at least one access code is filed, with at least one second mobile communications unit and with a receiver unit for receiving the access code, it is provided that the method comprises the following steps:
a) transmitting the access code from the first communications unit to the second communications unit;
b) transmitting the access code from the second communications unit to the receiver unit;
c) checking the access code by the receiver unit; and
d) freeing the access if the check is successful.
The method according to the present invention is based on the recognition that through the use of several mobile communications units which are equipped to communicate at least one access code amongst one another and to the receiver unit there is created an access control system in which the transfer of an access right by means of the communications unit carried by the user can take place in simple, but nevertheless secure manner.
Moreover, the method according to the present invention makes it possible for the access code stored on the various communications units to be communicated, for example, by a central computer unit to selected communications units and thus to also be able to be changed or locked during the provided use time period.
A method is provided by the present invention which is preferably used for access control of elevators and buildings, offices, dwellings and individual rooms in units of that kind. A wireless communication between the units is preferably used for communication of the data in the form of code sequences which can comprise, apart from the access codes, further data. A near-field communications system is preferably provided as communications network. This means that the communication between the respective units is possible only within a near field. In this manner it can be ensured that no unauthorized access to the communications network takes place and that there is no possible spying on access codes. The term “unit” in the case of the present invention forms a generic expression for the communications units and the receiver unit.
In an advantageous development of the method it is provided that the access code is transmitted and received only when the mutually communicating units are spaced from one another at a predetermined distance. Advantageously this spacing is less than approximately ten meters, preferably less than approximately one meter. It can thus be provided that the access code can be transmitted from the first communications unit to the second communications unit only when the two communications units are held near one another, for example at a distance of a few centimeters. Conventional interfaces, particularly infrared interfaces, can be used for a wireless, radio-based data transmission of that kind and, in particular, the NFC standard can be used as transmission standard.
In a development of the method according to the present invention it is proposed that the access code is provided with at least one attribute and/or at least one attribute of the access code is changed. Advantageously it is provided in this connection that the attribute is created or changed by the first communications unit or by the second communications unit. In that case, inter alia, a specific running time or a copying protection can be assigned as the attribute. This makes it possible for the access code to be stored in the form of an electronic key on a mobile telephone to be secure against copying and incapable of editing. On the other hand, an attribute can also be provided according to which a restricted number of copies of the electronic key can be created or the electronic key can only be cancelled.
It can be provided as a further safety barrier that the access is freed only within a predetermined period of time. Thus, for example, access for a first group of persons can be allowed only during the day and for a second group of persons only at night. In order to make this possible the receiver unit and/or the mobile communications unit can be appropriately equipped and/or the access code itself can be appropriately generated.
In order to furnish a security measure independent of time, in an advantageous development of the method of the present invention the access code is cancelled after a predetermined number of uses for freeing the access. The cancellation can take place after a single use or multiple uses and either automatically or by an authorized person operating a central computer unit.
For filing the access code on the first communications unit a computer unit generates the access code and communicates this to the first communications unit. In that case the communication by the computer unit to the first communications unit can take place by means of a global, local or near-field communications network. Alternatively, a wire-bound line for data transmission can also be used.
Preferably a mobile telephone is used as the first communications unit and/or the second communications unit. Thus, it is possible to avoid an obligation for the user to carry, apart from his or her mobile telephone, a further mobile communications unit.
In a development of the method according to the present invention it is proposed that the access code is processed by means of the first communications unit and/or by means of the second communications unit. In this manner, for example, an access code of a door lock can be blocked by the mobile communications unit without the receiver unit or a central computer unit having to be operated for this purpose.
DESCRIPTION OF THE DRAWINGS
The above, as well as other, advantages of the present invention will become readily apparent to those skilled in the art from the following detailed description of a preferred embodiment when considered in the light of the accompanying drawings in which:
FIG. 1 is a schematic illustration of an access control system according to the present invention.
DESCRIPTION OF THE PREFERRED EMBODIMENT
FIG. 1 schematically shows an access control system for a space closed by a door 1, for example for an elevator. The door 1 is equipped with an electronic door lock 2 and a receiver unit 10. The access control system additionally comprises a first mobile communications unit 20 and a second mobile communications unit 30. For release of the door lock 2 there is necessary an electronic key in the form of an access code which is generated by a central computer unit 40 and communicated to a memory unit 21 of the first communications unit 20.
This access code could now be communicated directly from the first communications unit 20 to the receiver unit 10 of the door lock 2. However, it is preferentially provided that the access code is, for transfer of the access right to another person, transmitted to the second communications unit 30. Before this communication of the access code the user of the first communications unit 20 can selectively process the access code. For this purpose the user selects the desired function, for example “Copy”, in a menu by way of a display 23 and a keyboard 24 of the first communications unit 20 and subsequently transmits the copy of the access code to the second communications unit 30 by selection of the function “Transfer”. The first communications unit 20 has for transfer of the access code an interface 22 and the second communications unit 30 has an interface 32 for wireless, radio-based data transmission. In this connection the data transfer takes place only when the first communications unit 20 is disposed in a near field of the second communications unit 30 or conversely. For example, the distance between the interfaces 22, 32 amounts to only a few centimeters. The NFC standard is used as transmission standard. The communicated access code is stored in a memory unit 31 of the second communications unit 30.
Within the scope of processing the access code by the first communications unit 20 the access code can be provided with an attribute or an attribute already assigned by the computer unit 40 can be changed. A specific running time or a copying protection is preferably assigned as attribute. It can equally be provided that the second communications unit 30 is authorized to be able to similarly undertake specific changes to the access code.
After successful transfer of the access code from the first communications unit 20 to the second communications unit 30 a release of the door lock 2 can now be achieved by means of the second communications unit 30. For this purpose the second communications unit 30 is held with its interface 32 near an interface 12 of the receiver unit 10 so that a wire-free communication of the access code by means of a near-field network and the NEC standard is possible. The second communications unit 30 has a display 33 and a keyboard 34 for operating the second communications unit 30 by way of a menu guide. After the receiver unit 10 has received the thus-communicated access code and filed it in a memory unit 11 this is compared with an original access code filed by the computer unit 40 in the memory unit 11 of the receiver unit 10. In the case of agreement of the access code with the original access code the receiver unit 10 issues a control signal for release of the door lock 2.
In order to also sufficiently take into account the highest safety requirements the second communications unit 30 and/or the receiver unit 10 can be so equipped that release of the door lock 2 takes place only as long as the second communications unit 30 is located within a specific distance from the receiver unit 10, for example within a near field. Alternatively, the access code can also be programmed so that the door lock 2 is released only within a predetermined period of time or at a specific point in time. In addition, the release of the door lock 2 can also be activated only when not only the first communications unit 20, but also the second communications unit 30 are disposed within a predetermined distance from the receiver unit 10. In order to exclude use of the communications units 20, 30 by unauthorized persons every communication of the access code by one of the units 20, 30 can be secured by an advance PIN code interrogation.
Moreover, the access code for the door lock 2 can be locked by the first communications unit 20 without the central computer unit 40 having to be operated for this purpose. For this purpose the authorized party holds the first communications unit 20 at the receiver unit 10 and selects in the menu the option “Lock” for locking the access code. Thus, another user cannot open the door lock 2 by the second communications unit 30 and the access code filed there.
The described method for access control to a space closed by the door 1 is distinguished particularly by the fact that the electronic key is transferable in the form of an access code from the first communications unit 20 to the second communications unit 30 in simple manner by wireless data transmission, wherein security is guaranteed in that the communications units 20, 30 are usable only after a PIN code interrogation and the data transmission is possible only in a near field.
In accordance with the provisions of the patent statutes, the present invention has been described in what is considered to represent its preferred embodiment. However, it should be noted that the invention can be practiced otherwise than as specifically illustrated and described without departing from its spirit or scope.

Claims (12)

1. A method of controlling access to an area accessible by persons, particularly to a space closed by a door, with a first mobile communications unit on which at least one access code is filed, with at least one second mobile communications unit and with a receiver unit for receiving the access code, wherein the method comprises the following steps:
a) transmitting the access code from the first mobile communications unit to the second mobile communications unit, the access code being transmitted and received only when the mutually communicating first and second mobile communications units are spaced from one another within a predetermined first distance, which first distance is a transmission range of the first mobile communications unit of less than ten meters;
b) transmitting the access code from the second mobile communications unit to the receiver unit, the access code being transmitted and received only when the mutually communicating second mobile communications unit and receiver unit are spaced from one another within a predetermined second distance, which second distance is a transmission range of the second mobile communications unit of less than ten meters;
c) checking the access code by the receiver unit; and
d) freeing the access to the area if the check is successful.
2. The method according to claim 1 wherein the access code is provided with at least one attribute or at least one attribute of the access code is changed.
3. The method according to claim 2 wherein a specific running time or a copying protection is assigned as the at least one attribute.
4. The method according to claim 2 wherein the at least one attribute is created or changed by the first mobile communications unit or by the second mobile communications unit.
5. The method according to claim 4 wherein a specific running time or a copying protection is assigned as the at least one attribute.
6. The method according to claim 1 wherein the access is freed only within a predetermined time period.
7. The method according to claim 1 wherein the access code is cancelled after a predetermined number of uses for freeing the access.
8. The method according to claim 1 wherein a computer unit generates the access code and communicates the access code to the first mobile communications unit.
9. The method according to claim 1 wherein a mobile telephone is used as the first mobile communications unit or the second mobile communications unit.
10. The method according to claim 1 wherein the access code is processed by the first mobile communications unit or by the second mobile communications unit.
11. The method according to claim 1 wherein the predetermined first distance is less than one meter.
12. The method according to claim 1 wherein the predetermined second distance is less than one meter.
US11/459,992 2005-07-28 2006-07-26 Method of controlling access to an area accessible by persons, particularly to a space closed by a door Active 2028-10-31 US7796012B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP05106990 2005-07-28
EP05106990 2005-07-28
EP05106990.4 2005-07-28

Publications (2)

Publication Number Publication Date
US20070024417A1 US20070024417A1 (en) 2007-02-01
US7796012B2 true US7796012B2 (en) 2010-09-14

Family

ID=35998549

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/459,992 Active 2028-10-31 US7796012B2 (en) 2005-07-28 2006-07-26 Method of controlling access to an area accessible by persons, particularly to a space closed by a door

Country Status (5)

Country Link
US (1) US7796012B2 (en)
JP (1) JP2007087370A (en)
KR (1) KR20070014995A (en)
CN (1) CN100524369C (en)
CA (1) CA2553511A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090206985A1 (en) * 2008-02-19 2009-08-20 Advanced Connection Technology Inc. Control method and system for controlling access through an automated door
US8120460B1 (en) * 2009-01-05 2012-02-21 Sprint Communications Company L.P. Electronic key provisioning
US9135422B2 (en) 2011-01-06 2015-09-15 Utc Fire & Security Corporation Trusted vendor access
US9842446B2 (en) 2012-08-21 2017-12-12 Onity Inc. Systems and methods for lock access management using wireless signals

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL1033539C2 (en) * 2007-03-13 2008-09-17 Nedap Nv Access control system using mobile phone with NFC technology, compares authorization information on server with identification codes for phone and electronic lock
US9670694B2 (en) * 2007-04-12 2017-06-06 Utc Fire & Security Americas Corporation, Inc. Restricted range lockbox, access device and methods
US20100332028A1 (en) * 2007-12-28 2010-12-30 Mobilysim Radiofrequency dispensing of electronic tickets
US20100079250A1 (en) * 2008-09-26 2010-04-01 Toshiba Tec Kabushiki Kaisha Information-Processing Device and System For Restricting Use of the Device
JP2011063965A (en) * 2009-09-16 2011-03-31 Gl Sciences Inc Noncontact communication system
CN102103765A (en) * 2009-12-16 2011-06-22 中兴通讯股份有限公司 Access control and information display system, method and terminal
EP2660786B2 (en) 2010-09-23 2019-10-23 BlackBerry Limited Communications system providing personnel access based upon near-field communication and related method
CN102155120A (en) * 2011-02-14 2011-08-17 深圳桑菲消费通信有限公司 Door lock control system based on NFC and method thereof
CN102332186B (en) * 2011-11-11 2015-10-14 珠海市银东科技有限公司 The Intelligent entrance guard management system that both-way communication and multi-layer authorization are checked and approved
JP6120434B2 (en) * 2012-09-26 2017-04-26 美和ロック株式会社 Gate electronic key management system and electronic key management method thereof
CN103793960B (en) * 2012-10-31 2016-12-21 株式会社易保 Method for mobile key service
CN103578165B (en) * 2013-03-08 2016-06-29 高潮 A kind of burglary-resisting system
EP3073283B1 (en) 2015-03-23 2019-04-24 Assa Abloy AB Method and device for considering whether a portable key device is located inside or outside a barrier
CN107690772B (en) 2015-05-01 2021-05-11 亚萨合莱有限公司 Intangible indication of duress via wearable device
GR1009296B (en) * 2017-02-15 2018-05-23 Προδρομος Γεωργιου Μικρος Autonomous unbreakable system for electronic door's locking and access control
CN109064599A (en) * 2018-07-27 2018-12-21 新华三技术有限公司 Purview certification method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1065637A2 (en) 1999-06-28 2001-01-03 Hitachi, Ltd. Ticket transfer program, method, system, and program medium
EP1233378A1 (en) 2001-09-21 2002-08-21 Siemens Aktiengesellschaft System for creating and using temporary authorizations and mobile telecommunication terminal therefor
US20020180582A1 (en) * 1999-11-30 2002-12-05 Nielsen Ernst Lykke Electronic key device a system and a method of managing electronic key information
US20030036355A1 (en) * 2001-08-01 2003-02-20 Michael Gundlach Method for electronically paying for the use of a means of transportation, associated monitoring methods and associated units
EP1411475A1 (en) 2002-10-18 2004-04-21 Hitachi, Ltd. System and method of communication including first and second access point
EP1439495A1 (en) 2003-01-17 2004-07-21 Siemens Aktiengesellschaft Electronic ticket, system and method for issuing electronic tickets, and devices and methods for using and performing operations on electronic tickets
US20040249714A1 (en) 2001-06-21 2004-12-09 Gregor Ponert Method for purchasing a service
US20070033649A1 (en) * 2005-07-20 2007-02-08 Booleansoft Secure remote access technology

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4476591B2 (en) * 2003-10-03 2010-06-09 株式会社Nttファシリティーズ Entrance / exit management system, remote device, and entrance / exit management method
JP4494851B2 (en) * 2004-04-16 2010-06-30 ソニー・エリクソン・モバイルコミュニケーションズ株式会社 Lock system, portable terminal, computer program, and password invalidation method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1065637A2 (en) 1999-06-28 2001-01-03 Hitachi, Ltd. Ticket transfer program, method, system, and program medium
US20020180582A1 (en) * 1999-11-30 2002-12-05 Nielsen Ernst Lykke Electronic key device a system and a method of managing electronic key information
US20040249714A1 (en) 2001-06-21 2004-12-09 Gregor Ponert Method for purchasing a service
US20030036355A1 (en) * 2001-08-01 2003-02-20 Michael Gundlach Method for electronically paying for the use of a means of transportation, associated monitoring methods and associated units
EP1233378A1 (en) 2001-09-21 2002-08-21 Siemens Aktiengesellschaft System for creating and using temporary authorizations and mobile telecommunication terminal therefor
EP1411475A1 (en) 2002-10-18 2004-04-21 Hitachi, Ltd. System and method of communication including first and second access point
EP1439495A1 (en) 2003-01-17 2004-07-21 Siemens Aktiengesellschaft Electronic ticket, system and method for issuing electronic tickets, and devices and methods for using and performing operations on electronic tickets
US20070033649A1 (en) * 2005-07-20 2007-02-08 Booleansoft Secure remote access technology

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090206985A1 (en) * 2008-02-19 2009-08-20 Advanced Connection Technology Inc. Control method and system for controlling access through an automated door
US8120460B1 (en) * 2009-01-05 2012-02-21 Sprint Communications Company L.P. Electronic key provisioning
US9135422B2 (en) 2011-01-06 2015-09-15 Utc Fire & Security Corporation Trusted vendor access
US9438585B2 (en) 2011-01-06 2016-09-06 Utc Fire & Security Corporation Trusted vendor access
US9842446B2 (en) 2012-08-21 2017-12-12 Onity Inc. Systems and methods for lock access management using wireless signals

Also Published As

Publication number Publication date
JP2007087370A (en) 2007-04-05
CA2553511A1 (en) 2007-01-28
KR20070014995A (en) 2007-02-01
CN100524369C (en) 2009-08-05
CN1904948A (en) 2007-01-31
US20070024417A1 (en) 2007-02-01

Similar Documents

Publication Publication Date Title
US7796012B2 (en) Method of controlling access to an area accessible by persons, particularly to a space closed by a door
CN105593911B (en) Access control method and access control system
JP5438253B2 (en) How to restrict access to areas where people can go in and out, especially spaces closed by doors
CN100588814C (en) Method of authorization
KR101699474B1 (en) System and method for controlling elevator system access
KR101296863B1 (en) Entry authentication system using nfc door lock
KR20070014989A (en) Method of controlling access to an area accessible by persons, particularly to a space closed by a door
KR101995663B1 (en) Keyless doorlock system and mathod
KR101722900B1 (en) Door lock system capable of setting a temporary password and the control method thereof
CA2956070C (en) Natural language user interface
JP2013021717A (en) Method for triggering process within building
US20030117260A1 (en) Access control system
US20130117815A1 (en) Method of Authorizing a Person, an Authorizing Architecture and a Computer Program Product
JP4390817B2 (en) Authentication processing system, mobile communication terminal, and authentication processing method
JP2007172039A (en) Login management system and method using location information of user
CN108990043A (en) A kind of remote unlocking method and its intelligent door lock based on core network communications
US20150206363A1 (en) Hierarchical code locking system
JP2019003356A (en) Car sharing system
JP2023103511A (en) automatic unlocking system
JP2007272618A (en) Security system, authentication device, and communication terminal
IE20070342U1 (en) An access control device
IES20070342A2 (en) An access control device

Legal Events

Date Code Title Description
AS Assignment

Owner name: INVENTIO AG, SWITZERLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GERSTENKORN, BERNHARD;REEL/FRAME:018037/0678

Effective date: 20060721

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552)

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12